ca ex s3 c7 basic wireless concepts and configuration
DESCRIPTION
TRANSCRIPT
CCNA – Semester 3
Chapter 7: Basic Wireless
Concepts and Configuration
CCNA Exploration 4.0
2
Objectives
• Describe the components and operations of basic
wireless LAN topologies.
• Describe the components and operations of basic
wireless LAN security.
• Configure and verify basic wireless LAN access.
• Configure and troubleshoot wireless client access.
3
The Wireless LAN
4
Why Use Wireless?
• Business networks today are evolving to support people who
are on the move.
• Mobility environment: where people can take their
connection to the network along with them on the road.
• There are many different infrastructures (wired LAN, service
provider networks) that allow mobility like this to happen, but
in a business environment, the most important is the WLAN.
• People now expect to be connected at any time and place
5
Wireless Technologies
6
Wireless LAN
7
Comparing a WLAN to a LAN
• In an 802.3 Ethernet LAN, each client has
a cable that connects the client NIC to a
switch. The switch is the point where the
client gains access to the network.
• In a wireless LAN, each client uses a
wireless adapter to gain access to the
network through a wireless device such as
a wireless router or access point.
8
Wireless standards
9
Wireless Infrastructure Components
10
Configurable Parameters for Wireless
Endpoints
• Wireless mode
• Wireless Network Name: SSID
• Wireless Channel:
11
802.11 Topologies: Ad hoc Network
12
802.11 Topologies: Basic Service Sets
13
802.11 Topologies: Extended Service
Sets
14
Client and Access Point Association
• Beacon
15
Client and Access Point Association
16
Client and Access Point Association
Step 3 - 802.11 Association
17
Planning the Wireless LAN
18
Planning the Wireless LAN
19
Planning the Wireless LAN
20
Planning the Wireless LAN
21
Wireless LAN Security
22
Wireless LAN Security Threats
Unauthorized Access
23
Wireless LAN Security Threats
24
Wireless LAN Security Threats
Denial of Service
25
Wireless Security Protocols
26
Wireless Security Protocols
27
Wireless Security Protocols
28
Wireless Security Protocols
• Encryption
29
Securing a Wireless LAN
30
Configure Wireless LAN Access
31
Configuring the Wireless Access Point
32
Setup: Basic Setup
33
Administration: Management
34
Configuring Basic Wireless Settings
35
Security Mode
• Select the mode you want to use: PSK-Personal, PSK2-
Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or
WEP.
36
Mode Parameters
• Enterprise modes are not configured in this chapter
37
Configure Encryption and Key
38
Configure a wireless NIC: Scan SSID
39
Configure a wireless NIC: Scan SSID
40
Select the Wireless Security Protocol
• Practice: 7.3.2.4
41
Troubleshooting
Simple WLAN Problems
42
Systematic Approach to WLAN
Troubleshooting
• Step 1 - Eliminate the client device as the source of the
problem.
• Step 2 - Confirm the physical status of WLAN devices.
• Step 3 - Inspect wired links.
43
Updating the Access Point Firmware
44
Incorrect Channel Settings
45
Incorrect Channel Settings: Solution
46
Solving RF Interference
47
Solving RF Interference
• Site Surveys
48
Site Survey
• Two categories: Manual and utility assisted.
• Manual site surveys can include a site evaluation to be
followed by a more thorough utility-assisted site survey. A
site evaluation involves inspecting the area with the goal of
identifying potential issues that could impact the network.
Specifically, look for the presence of multiple WLANs,
unique building structures, such as open floors and
atriums, and high client usage variances, such as those
caused by differences in day or night shift staffing levels.
• Note: you do not conduct site surveys as part of this course
49
Access Point Misplacement
50
Access Point Misplacement: Solution
51
Access Point Misplacement: Solution
• Ensure that access points are not mounted closer than 7.9 inches (20
cm) from the body of all persons.
• Do not mount the access point within 3 feet (91.4 cm) of metal
obstructions.
• Install the access point away from microwave ovens. Microwave ovens
operate on the same frequency as the access point and can cause
signal interference.
• Always mount the access point vertically (standing up or hanging
down).
• Do not mount the access point outside of buildings.
• Do not mount the access point on building perimeter walls, unless
outside coverage is desired.
• When mounting an access point in the corner of a right-angle hallway
intersection, mount it at a 45-degree angle to the two hallways. The
access point internal antennas are not omnidirectional and cover a
larger area when mounted this way.
52
Problems with Authentication and Encrytion
53
Problems with Authentication and Encrytion
54
Problems with Authentication and Encrytion
55
Summary
56